Category Archives: Security

Merger of Security & Compliance, what it Means for Cloud Developers

Recent data breaches that are splashed across the news have made the point crystal clear that data protection can no longer be an add-on that businesses source out externally to complete. It’s become a critical issue that companies are now learning how to deal with internally, and there are three key trends that are shaping the area of data protection, having a huge influence on how these protections are achieved more successfully.

Bitcoin Miner Virus: How To Detect And Delete It

bitcoin-virus

The trending topics all over the world center around digital currencies and Bitcoin is one of the most popular ones. Back in 2017 December, the worth of Bitcoin practically crossed about $19,000 and almost touched $20,000.

TLS vs SSL: What’s the Difference ?

Online security is vital these days if we want to avoid becoming victims of unscrupulous malware, spyware, and phishing attacks. With internet criminals becoming more and more crafty, sophisticated and highly organized, the only way to ensure adequate protection is to make sure that your online activities are protected by the latest security protocols.

You’re More Likely To Fall Victim to a Cyberattack Than a Home Invasion

By the time most people start to notice that their data has been compromised, it’s too late. Modern hackers continue to develop savvier ways to steal your data, and most people have no clue how to defend themselves.

Yet you can learn how to prevent a cyber attack by studying the patterns from past scenarios. So, what are the trends hackers tend to follow?

netstat – 10 Most common usage with examples

netstat is a powerful  command line utility in Unix, Linux and Unix like systems to show information about

  • network connections,
  • routing tables,
  • interface statistics,
  • mas-querade connections
  • multicast memberships

By default, netstat displays a list of open sockets of all configured address families , tcp , udp etc.
netstat provide very extensive network details and here are the top netstat usage with different options to get you the just the information you need.

The Top Security Breaches in History

Thanks to technology, most businesses these days are now able to process and manage data more
efficiently and effectively. However, as the internet and digital platforms become more of a necessity to process critical business information, the risk of being targeted for data breach also increases.

DNS Sinkhole Setup : Your defense against Bot net controllers

According to statistics published in csoonline.com cyber crimes damages will hit 6 trillion by 2021 and 6 billion people target ( 75% of projected 8 billion population).  As the access to network is increasing,  hacking and committing cyber crime has become as easy as sending an email with malware link and its clicking by unsuspecting victims.

A botnet consists of a  number of  compromised hosts  controlled by botnet controller managed by third parties .  Bot net constitutes a major security threat and used to deploy malware, steal sensitive data, orchestrate DDoS attack.  Once systems inside a network are compromised by installing malware it becomes very difficult to detect as the theft of data and sources of DDoS is orchestrated from within the network.

DNS sink hole is a process to identify the bot net master hosting malware software servers and assign the dns record of these hosts to localhost, non-existing or unused ip address . A  valid ip is not returned for these host resolution and the infected host never connects to the bot net master server.

In order to understand how DNS Sink hole work we need to understand the bot net structure and its organization.

 How a bot network is organized and activated ?

The initial part involves getting access to inside corporate network.  This can be achieved in many ways like using brute force method to crack the passwords and encrypted data and other approach is rather simple, involving sending a link in email and betting on the chances that some users will click the link and deploy malware on their computers.

KRACK – Key Reinstallation Attacks on WPA2 Protocol

Introduction

KRACK is a security flaw with WPA2  security and it allows to  compromise wireless WPA security  by forcing nonce reuse .

This is not an issue related to passwords but the protocol used by WPA and impacts pretty much all devices which uses wi-fi connection like phone, computers, wi-fi routers are impacted.

Linux PIE/stack corruption (CVE-2017-1000253) Bug and Security Vulnerability

About CVE-2017-1000253 Bug:

This issue is related to the Linux kernel loaded Executable and Linkable Format (ELF) executables. If an ELF application was built as Position Independent Executable (PIE), the loader can allow part of that application’s data segment to map over the memory area reserved for its stack.
It  can cause memory corruption and may allow an unprivileged local user to gain privileged access using Set owner User ID (SUID) or privileged flawed PIE binary.

SHA-1 Collision – Insecurity of SHA-1 exposed by Google

SHA-1 is widely used in applications like SSL, SSH, TLS, IPsec PGP, S/MIME to protect the sensitive information.

Google has demonstrated that SHA-1 Collision is possible and two files can have the same SHA-1 hash. This means that system can be manipulated by presenting it with manipulated data with same hash as good data.